Who is Tracking '
Paid app link :https://play.google.com/store/apps/details?id=com.appz.trackingpaid
The application will detect any malicious APPS or BLOATWARE trying to track your location and user information (Bluetooth, WiFi, Bank Accounts, Messages, GPS, Social Networks information, 2G & 3G, etc.).
Application - Features :
'Who is Tracking' will detect any malicious apps or bloatware trying to track your location using GPS, or tracking user data from incoming / outgoing call lists, messages, Wi-Fi network information, 2G/3G data, Gmail, Facebook and similar apps. (Few features works only paid). Using this applicaiton you can find-out any one HACKING or TRACKING your phone.
WiFi, GPS,2G,3G,4G,GPS,NFC & SERVER TRACKER: After running the detection test, you will receive a real time sound alert if any traces of tracking is found. In-case anyone is trying to track you, the sound will come automatically (Real time sound works only paid).
App Server Tracker : Track apps server location (Which country server the app is using) Gmail Server location, FB, Twitter, etc...
Sus App list : List Danger apps
App Permission Blocker - Block certain application permission..
Sound Alert : After running the detection test, you will receive a real time sound alert if any traces of tracking is found. In-case anyone is trying to track you, the sound will come automatically (Real time sound works only paid).
System Information : Know about your device system information (Processor, CPU Core , SD card, Memory).
Android OS : Manufacture info, Model No, Product Release, Version, Device Info, Open GL, Kernel info, etc.
App Permission : List of permission required by the apps.
User Installed App : List of applications installed by user.
System App : List of System apps.
'Who is Tracking 'provides a list of all apps which are accessing GPS, Wi-Fi, 2G/3G, Gmail and other apps, and also the reason why the apps need this info (Few features works only paid).
Allow Mock Allocation : Enable this feature to send mock GPS data if any app is trying to access GPS info for longer duration or multiple times.
[ Example : Yelp has permissions to access GPS data to triangulate on your current location to provide you with restaurants around you. But it accesses the data only once on initialization, but malicious tracking apps will keep accessing the GPS data to track your movements and location at all times in the background. ]
Select - Delete History : Deletes complete history information from your device (Few features works only on paid version).
Why 'Who is Tracking ' was created
There are communities in hacker forums and blogs whereby they push to develop and publish apps which can track your data and retrieve the extracted information (Ex. your contact information, email IDs, phone numbers, saved bank account details or any other important information).
Android, to a certain extent, can restrict such apps from being published in PlayStoreTM , but hackers bypass these by using techniques like reflection, API mirroring, etc.
Even though all the custom ROM developers take immense care in providing ultimate user data protection, still hackers copy the OS, modify the APIs to provide access to personal data and hidden / internal APIs. By this, they will be able to monitor, record and access the data created by you while sharing with various apps on your Android device.
We used a couple new features of ANDROID to stop hackers to track the information.
http://selinuxproject.org/page/SEAndroid
http://source.android.com/compatibility/
http://efytimes.com/e1/fullnews.asp?...date=6/10/2013
http://securitywatch.pcmag.com/mobil...ld-for-android
http://www.electronicsweekly.com/eye...droid-2013-03/
Any issue, feel free mail me.. we will release paid version very soon with complete features..
Please Don't forget to hit THANKS BUTTON.
seems useful. it's always frightining to know what android can do with your data. how it can very easily compromise your privacy. but,apps like these should be installed by default in base os. users have right to know what's happening to their data and where it is going. Thanks fir your effort. also, a quick question? if some apps have so much power to buypass security protocols and hack ur data,then what about custom roms? aren't they capable of doing that? can a developer tweek things and add scripts that very easily transfer almost all data my phone collects? like most people here on xda, i use a lot of custom roms for my devices and this is one of the questions i always wonder.
Sent from Heaven
delay response..
Check the inline comment....
lavinigam said:
seems useful. it's always frightining to know what android can do with your data. how it can very easily compromise your privacy. but,apps like these should be installed by default in base os. users have right to know what's happening to their data and where it is going. Thanks fir your effort. also, a quick question?
if some apps have so much power to buypass security protocols and hack ur data,then what about custom roms?
What is the meaning of custom rom, developed by the general user etc.... There are default behavior in android which no one will change.. its a flow... so once app can work for any device with any rom.. simple logic....
aren't they capable of doing that? can a developer tweek things and add scripts that very easily transfer almost all data my phone collects?
If the custom rom dev thing he can do that... its your wish to choose to use or not.... but 99.9% they will not.. its all about brand name.. no one here to spoil or hack data... we are here to save users.. as much as we can...
like most people here on xda, i use a lot of custom roms for my devices and this is one of the questions i always wonder.
Hope you understand my answer...
Sent from Heaven
Click to expand...
Click to collapse
After weeks of hard work we (uncle Fab and Setmov) proudly present you the first Una ROM for the Galaxy Note 10.1 N8000, based on 4.1.2 XXCML2.
DISCLAIMER
As usual, your phone your responsability, we won't take any responsability if it flies out of the window or if your girlfriend/boyfriend runs away with it.
PLEASE, DO READ OP COMPLETELY AND CAREFULLY BEFORE ASKING ANY QUESTIONS, ANSWERS TO MOST PROBLEMS ARE HERE
WHAT IS UNA?
Una is a new concept that takes security to a new level.
Are you tired of seeing so much blatant, outrageous and shameless invasion of your privacy and data mining hidden behind nice sentences like "enhanced use experience" or "complete integration with the system"? We decided to develop secure ROMs where privacy means just that – Private!.
It’s free of charge, we are a non profit structure and we are not here to make big bucks
WHAT UNA ISN'T
UNA isn't a way to help you to stealthily buy massive destruction weapons to foment a coup d'etat in your favorite banana republic or to prepare the third world war.
UNA secures what leaves from your phone (ie your personal data doesn't leak and no app can look over your shoulder to spy your activities), but it can't completely secure what comes into your phone.
Why is that?
Because it's just not possible to fully secure a phone from what comes into it, and anyone claiming to be able to do it is either a liar, or an ignorant, or both.
There are too many attacks, some not well documented, if documented at all, and some unknown to the public, and there are too many ways to hack a phone, especially if the user doesn't use his/her common sense.
If you are the type of person that installs apps from shaddy source and/or warez web sites (sites offering cracked paid apps) chances are that at some point you will unknowingly install a malware or a spyware. The same applies if you click on any link, specially on SMS' and emails, if you let any pop out window appear or if you don't protect your lockscreen with a password/pin/pattern and let anyone get physical access to your phone.
A bit of judgment and common sense can save you a lot of trouble, but there's unfortunately nothing UNA can do about it.
Then, if you use your phone to call through GSM your provider will know where you are. If he didn't you wouldn't be able to make any call, the signal has to find you and there's nothing UNA or anyone can do about it.
The only way to prevent that is to disable the phone functions (but then your phone will turn into a wifi only device) and reenable them when needed, head to the scripts section to learn how to do it.
Last but not least, bear in mind that the agencies have armies of tech savvy henchmen and 10 storeys computers, and tricks we can't even imagine, so think twice and use your brain before you attempt to outsmart them...
UNA IS FOR YOU IF:
. You are willing to learn how to use an unconventional ROM and generally speaking to understand how things work, even if it sometimes requires a little effort to fix this or that little problem (bear in mind that it took us a lot of work to develop Una to where it is now),
. You don't mind a few little occasional bugs here and there that come from all the restrictions the ROM contains,
. You want to take back ownership of your phone from google’s claws.
UNA IS NOT FOR YOU IF:
. All that you care about is the latest gimmick in the latest OS,
. You can't live without the google’s apps,
. You are the kind of person that never reads through the OP and only scroll down to the download section, and then complain that things don't work and/or ask stupid questions that have already been answered in OP.
An example? One guy makes a mod and writes clearly in OP that it's specifically for 4.2.2. Then some people complain: "it doesn't work on 4.4.2"...
ARE WE PARANOID TIN FOIL HATS? OR TERRORISTS? OR CARTEL BOSSES?
Nope, we only are people that don't see why we shouldn't be in control of our phones. Or why our phones can be wiped remotely, why apps or updates or who knows what can be downloaded and installed without asking for our consent, why SMS' can be sent without us to know, why we should pay for the bandwidth used for data mining and unwanted downloads, and why all those activities should deplete our battery and kill our RAM.
You think we are overreacting here?
You don't have to take our word for it, just download and install Network Log from here:
https://f-droid.org/repository/browse/?fdfilter=network+log&fdid=com.googlecode.networklog
Give it root permission, start logging and open some web pages. Come back to Network Log after a few minutes and see for yourself, you'll be surprised (or maybe horrified?) to find out that your android system, your settings, your kernel etc. connect to all sorts of funny IPs, including and foremost google’s.
Now you see what we mean?
It's time to go for Una
UNA'S FEATURES
. Rooted.
. Deodexed.
. Zipaligned.
. Busybox and sqlite installed.
. Init.d support and scripts.
. Auto start disabled for most apps.
. About 100 system apps and 40 framework jars removed, plus files here and there.
. Very low RAM and CPU consumption.
. Heavily and extensively modified system, in order to make it secure and prevent it from leaking your data.
. App Settings, Firewall and Xprivacy built-in, and already applied out of the box to make sure you are well protected.
. Xprivacy is a fantastic tool but it has one big limitation, it can't restrict the Android System from accessing your serial numbers and leaking it. For that reason these IDs have been edited as follows:
ro.serialno is set to "1",
build.serial has been scrambled so that the system can't read it anymore and shows an empty value instead,
android id is set to "android".
. Serial_number, model_number, model_name, manufacturer and device_name in wpa_supplicant.conf all show an empty value (check the screenshots).
These fields normally show values that identify you and the system sends them home everytime you connect to the internet, Xprivacy can't do anything about it but Una can.
. USB ID (iSerial) set to 1.
. Vulnerabilities patched thanks to Master Key Multi Fix and Fake ID Fix.
. ADB disabled (can be re-enabled, see below).
. By default ADB and all google access (including youtube, blogspot and google search) are disabled. You can re-enable some or all of them, instructions are in the "HOW TO USE THE ROM" section.
. Plenty of under the hood modifications to make the ROM fast and fluid.
. Call button in contacts.
. Lollipop HD wallpapers.
. All apps can be opened in floating or static multiwindows mode.
. Heaps of hand picked and carefully scrutinized open source apps.
There are 2 non open source apps (Greenify and Quick Pic) but they are safe, believe me, I have thoroughly examined them. Still, you can always uninstall them if you feel like it.
In time we will develop our own apps, but first we want to see how people respond to the Una concept...
INSTALLED APPS/TOOLS
. 920 Editor, to create and edit scripts or text files.
. AF+ Firewall.
. Alarm clock.
. APG, to encrypt messages.
. App Settings, to restrict apps' permissions, change DPI on a per app basis and more.
. Arity, a calcultor.
. Conversations, a secure and encrypted chat, modded by uncle Fab for increased security.
. Fdroid, an alternative to the Play Store, and all the apps are open source!
. Floating stickies, to make small notes on the fly.
. FTP Server, to copy files to/from your phone wirelessly.
. Ghost Commander, a very powerful dual panel root file manager.
. Gravity Box, a theming engine.
. Greenify, to make apps behave by hibernating them when not in use.
. K9 Mail, an email client.
. Kernel Adiutor, if you feel like playing with kernel tweaks (but you have to know what you are doing).
. Lightning, a fast and light weight browser.
. Master Key Multi Fix, a patch to some vulnerabilities.
. Network Log, to check where your apps connect and chase unwanted connections.
. Open Camera.
. Tor (Orbot) for Android, modded by uncle Fab for increased security.
. Orweb, a browser designed to work along with Tor.
. OS Monitor, to monitor and kill your phone's processes, and more.
. Pale Moon, based on Firefox for Android, for a full desktop experience with Mozilla add-ons preinstalled for enhanced security.
. PDF Reader.
. Preferences Manager, to edit the otherwise difficult to read shared_prefs files in data/data.
. Quick Dic, a good selection of free dictionaries.
. Quick Pic, a Gallery app.
. Rmaps, a maps app where you can download maps from various sources for offline use.
. Terminal Emulator, fire up your commands and show your phone who is the boss!
. Text Secure, a secure and encrypted SMS app, modded by uncle Fab for increased security.
. Tint Browser, another fast web browser.
. Urecord, to record sounds with different sample rates.
. USB Mass Storage Enabler, to connect your phone to any computer (note that it only mounts the external SD).
. Viper4Android FX, a powerful sound enhancer.
. Viper4Android XHiFi, some more sound enhancements.
. VLC, a video and music player favourite.
. WI-Fi Privacy Police, to secure your connections even better than they already are.
. Xposed Installer, a great framework that enables apps like App Settings or Xprivacy to work.
. Xprivacy, last but not least, the best privacy app.
INSTALLATION
As usual, make a backup first!
Do backup your contacts and whatever is important because all your apps and data will be erased (your sd card contents won't be deleted though).
Do backup your /system/csc folder, in case you need it for later.
Do backup your efs folder (VERY IMPORTANT).
Open the android terminal on your phone and type:
su
enter, then type:
busybox dd if=/dev/block/mmcblk0p3 of=/sdcard/efs.img
enter, this will create an efs backup called efs.img in your sd card.
To restore it, first make sure the efs.img is in your internal sd card, then type:
su
enter, then type:
busybox dd if=/sdcard/efs.img of=/dev/block/mmcblk0p3
enter, your efs will be restored in no time.
If that sounds like too much work you can use the scripts provided to backup/restore your efs, instructions are in the scripts section.
To install the ROM you need a Custom Recovery and Philz' comes highly recommended.
We chose Philz since AFAIK it's the only one that allows you to lock you recovery with a password (if your recovery is not password protected it wouldn't take more than 2 minutes for someone to disable your pattern or pin protected lockscreen and access all your personal data on the phone).
Alas, we didn't find any working Philz recovery for the N8000 so for now we'll use High On Android (based on CWM).
Get it from here (credits @Koush and @zedomax):
http://forum.xda-developers.com/showthread.php?t=1831173
Now, download Una for N8000 from here:
http://unaos.com/
Head to the DOWNLOAD section and chose the N8000 model.
After the download, unzip the file and copy the folder that's inside into your sd card.
Boot into recovery.
Go to restore from sdcard, and go for it!
Once it's done reboot, congratulations, you have installed Una ROM on your phone!
HOW TO USE THE ROM
. Swipe down to access the applications drawer.
. Swipe up to open notifications.
. Press on the home button to turn off the screen
. Go to settings and set a stong password/pin/pattern protected lockscreen (recommended).
. Go in recovery and set a recovery password (recommended).
. Long pressing the back key brings you back to the last application (convenient to switch from one app to another).
. Press the reboot menu in the home screen to reboot/shutdown/boot into recovery or bootloader (note that there's an option to take screenshots in the reboot menu).
. Go to /system/etc/security/cacerts, check the certificates that are there (you'll find the certificate's name approximately by the middle of the file), and erase the ones you don't need/like.
When you want to transfer files to/from your phone open the USB Mass Storage Enabler app and enable mass storage, that's it. When you are done, don't forget to eject your phone from the computer and to reenable MTP from the app.
. When you install a new application, by default it will be fully restricted in both Xprivacy and the Firewall.
Before you open the newly installed app wait until the Xprivacy icon appears in the status bar, then and only then can you open it.
Most likely the app will crash.
Go to Xprivacy, open its settings and then usage data, you will see what restrictions caused the crash. Re enable some, provided that they are not too invasive.
Many apps require "load.Library" to be allowed in the shell section, that's ok.
Others may need to access the sd card, that's in the storage section and it's ok to allow it for apps that really need to access the storage, like players, cameras or file managers (for other apps try to keep it restricted).
Root apps obviously need "su" and/or 'sh", and sometimes "exec", in the shell section.
Always try to enable as few fields as possible, and bear in mind that data requested by an app is not necessarily needed for that app to work (especially true for identification, internet and mcc/mmc access).
Lastly, give the app internet access in the Firewall if, and only if, it needs it, and restrict some more permissions in App Settings.
If you can't tame the app consider uninstalling it and look for a similar one that has less built-in spyware.
SCRIPTS
. As said above, by default ADB and all google access (including youtube, blogspot and google search) are disabled.
If you want to re-enable some or all of them, open the script folder located in system/etc.
Click on the desired script and choose edit.
Copy the whole text and paste it into the Android Terminal, voila, the script is automagically executed.
. You will see more scripts to disable/enable the Bluetooth, the Media Storage/Provider, the MTP Application and the Phone.
If you disable the Phone and later want to re-enable it do as follows:
untick App Settings in Xposed's modules section, re-enable Phone, reboot, then enable App Settings again.
. I forgot to put the scripts to backup/restore your efs partition, let me know if you need them and I'll add them.
. Other scripts can enable/disable am and pm, but don't play with it unless you know what you're doing.
. You can uninstall the Wallpaper Chooser and the Media Storage/Provider if you want, or keep them disabled and resurrect them when needed.
. If you are very privacy concerned you should consider using the "uncle's phone lite" mod because it enables you to call with only the Phone and the Telephony Provider apps (CSC, Contacts, Contacts Storage, Logs Provider and STK are completely de-activated). That's the method I use to make calls, but you have to know that the dialler forces close after you complete the call (not a big deal in my opinion but still, I may look into it one of these days). You'll find the mod in the add-ons section.
ENCRYPTION
If encryption is your thing we have you covered with the following installed apps:
APG, Conversations, K9 Mail and Text Secure.
BUGS. Quick Dic won't download any dictionary, it's actually not a bug but a Una restriction since the app downloads from a google owned web site.
If you need to download dictionaries, temporarly enable google by running the "enable_google" script (don't forget to disable it again when you're done). After you've run the script go to the firewall, open its settings, go to "Set custom script" and click "OK" (do the same if you decide to disable again google's stuff).
. You can't download anything from Lightning and Tint Browser, that's because the Download Manager and the Download UI have been uninstalled. If you need to download something, copy the link and paste it in Pale Moon, it has its own download engine.
. I haven't been able to test properly the Phone/3G Features because the tab I used to make this ROM was in a rather poor shape and had its SIM card slot broken. I set restrictions the best I could by taking examples from other ROMs I made, but you may have to fine tune the Phone and Telephony Provider apps in Xprivacy, sorry about that .
. All the installed apps work, but other apps you install may crash. I call that kind of apps "google’s henchmen", they only work if the play store services or the bla bla app are installed and of course they won't on Una since all that garbage has been removed.
If I install your app, why do you want to force me to install your boss' app too? Forget about those apps and search Fdroid, you'll find what you need...
. Depending the way you use your phone you may have to fine tune Xprivacy and reenable some permissions, I'm sorry for the inconvenience but it's impossible to set Xprivacy for all users since we all have different ways to use our phone.
ADD-ONS
. Sony Xperia Keyboard, flash it in recovery.
Credits KristianCarl for porting it, and unclefab for theming it in green.
It's not open source and that's why it's not included in the rom by default, but it's my every day keyboard because it works fine and because I themed it to make it look nice.
Don't give it internet access in the Firewall.
In Xprivacy, only allow "loadLibrary" in the shell section. You may have to enable a few fields in the contacts section depending your phone's configuration.
In App Settings, restrict "Read_Phone_State" and "Record_Audio".
I removed the Chinese Keyboard, tell me if you want it and I'll readd it.
. HD Wallpapers
. Universe Wallpapers
http://romcook.com/?d=550FEB5C16
If there are enough users' requests then I'll upload the following:
. Uncle's phone lite (with clipboard and dialer) for hardcore users. It's safer than using the regular phone configuration, but the dialer forces close when you hang up the call. Flash it in recovery, wipe dalvik-cache, reboot.
. Completely disable internet access for the Android System. Lightning and Tint Browser won't connect anymore since they use the same web engine as the Android System, but Pale Moon still works thanks to its build-in web engine. Flash it in recovery, wipe dalvik-cache, reboot.
RECOMMENDED NON OPEN SOURCE APPS
. Pri-fy, from chainfire the root master:
http://forum.xda-developers.com/showthread.php?t=2631512
. Logging Test:
http://androidsecuritytest.com/
UPDATES?
I'm working on some improvements on kernel and system level to make Una even more secure, but I will release them for the N8000 if, and only if, there are enough users' feedback for the current version, because it's a lot of work to implement such stuff in a ROM moreover that I don't own this tab.
No ETA though, you'll have to be patient because now we have to design and release Una for many other phones.
Still, any suggestions/comments/bug reports are welcome, help us to improve Una!
FEATURE REQUESTS
Yeah, sure, we'll see what we can do but we don't promise anything
That's all for now, enjoy the ROM!!!
The Una team
CREDITS
Big thanks to:
F-Droid
M66B (Xprivacy)
Rovo89 (Xposed)
Tungstwenty (App Settings, Master Key Multi Fix, Fake ID Fix)
Ukanth (AF+Firewall)
Jecelyin (920 Editor)
Kraigsandroid (Alarm Klock)
Thialfihar (APG)
Arity (Arity calculator)
Siacs (Conversations)
Ppareit (FTP)
Ghost Squared (Ghost Commander File manager)
Mohammad Adib (Floating Stickies)
C3C076(Gravity Box)
Oasisfeng (Greenify)
K-9 Dog Walkers (K9 Mail)
Grarak (Kernel Adiutor)
Anthonycr (Lightning)
Xperiacle (Multiwindows Manager)
Pragmatic Software (Network Log)
Mdwh2(Open Camera)
The Guardian Project (Orbot and Orweb)
Eolwral (OS Monitor)
Moon Child and Cyansmoker (Pale Moon)
Droidapps (PDF Reader)
Simon Marquis (Preferences Manager)
Thad Hughes (Quick Dic)
Q-Supreme team (Quick Pic)
Robert.Developer (Rmaps)
Search Light (Search Light)
Jackpal (Terminal Emulator)
Anasthase (Tint Browser And Tint Browser Adblock Addon)
Thomasebell (Urecord)
Mohammad Abu-Garbeyyeh (USB Mass Storage Enabler)
Zhuhang (Viper4Android FX and Viper4Android XHiFi)
Videolan.org (VLC)
Brambonne (Wi-Fi Privacy Police)
NOTE:Screenshots:
We don't owe the device so we didn't have the time to make screenshots. The rom is very similar to the UnaOs ROM for the Galaxy Tab 7, so if you want to see how it looks like, please head to our website http://unaos.com and check the gallery section.
I dont suppose this might work on the wifi only version n8013?
If this were art, una would be a masterpiece
Just the right kinda of attitude and work towards privacy and security, ......having xprivacy preinstalled and pre-configured is one of those little things i like to call, "ahead of the game"
All the right ingredients here, you have my tip of the hat sirs........
banderos101 said:
I dont suppose this might work on the wifi only version n8013?
If this were art, una would be a masterpiece
Just the right kinda of attitude and work towards privacy and security, ......having xprivacy preinstalled and pre-configured is one of those little things i like to call, "ahead of the game"
All the right ingredients here, you have my tip of the hat sirs........
Click to expand...
Click to collapse
@banderos101 thank you for your support. We truly appreciate it.
On another thread for the SM-T111 (3G and Wifi) rom HERE, it seems someone has managed to install our rom on the SM-T110 (Wifi only) model. So, since your tab (the N8013) has (or it should have) the same hardware of the N8000 except for the 3G, you can always give it a try. Of course, if you do, make a full backup of your current system, so in case of failure you can go back and restore it. If you are going to give it a try, please let us know.
Thank you
Thanks for this amazing rom
any hope that you guys could make this available for the note 2 as well
specially for the LTE GT-N7105 Note 2
How to install when I installed kit kat 4.4.2 Greetings
So I installed it on my n8013, but there was an error when restoring the data and whatever else comes after that. It booted fine though and WiFi worked out of the box. The lack of a terminal app made it hard to do anything right off the bat. I'll check out some more of it later on and report back. Just wish I could have experienced this how it was intended.
Sent from my GT-N8013 using Tapatalk
electrikjesus said:
So I installed it on my n8013, but there was an error when restoring the data and whatever else comes after that. It booted fine though and WiFi worked out of the box. The lack of a terminal app made it hard to do anything right off the bat. I'll check out some more of it later on and report back. Just wish I could have experienced this how it was intended.
Sent from my GT-N8013 using Tapatalk
Click to expand...
Click to collapse
There s a terminal app in the Rom, or maybe it has been wiped away with the rest of the data?
If you want to try again what you can do is downloading aroma fm from here:
http://forum.xda-developers.com/showthread.php?t=1646108
Put it somewhere on your internal sd.
Now, reflash una rom.
Do not boot but flash aroma fm.
Once aroma is opened go to system/apps and delete the following apps:
contacts, contacts provider, csc, logsprovider, phone, telephony manager.
Clear cache and dalvik cache, reboot.
Hopefully this time the data will restore properly
@theonepharaoh:
unfortunately we don t have any Note II at hand, so we can t make a Una rom for that model
unclefab said:
@theonepharaoh:
unfortunately we don t have any Note II at hand, so we can t make a Una rom for that model
Click to expand...
Click to collapse
well I happen to have one
I can test the rom for you
plus it has the same chip that is in the note 10.1 and the S3
Is stagefright Vulnerable with this rom?
If not
Assuming theirs no flashable zip or installable app in the future, will you guys be patching your roms against stagefright if a method comes out?
Android security is surely lacking, the ratio of devices that have a chance of getting a HINT of a patch, and those that wont is kinda staggering........i find myself hoping for the next competitor to come along already, that actually implements from the ground up, a RESPECTABLE security and privacy implementation
or, somesort of fork of android or maybe even another OS......something that either has really strong security/privacy from the get go, or has good devs maintaining very well, for patching the new stuff i.e. stagefright...........one of the missing ingredients.......one of the few things that has had me keep my current device for the best part of 4 years, and no plans to change.........i am keeping an eye out for ara though........interested to see how that plays out.......imagine any propriety components being switched out for open source componants with driver/kernel/i.e support..........the fact that someone doesnt have to spend the time and resources to create a WHOLE phone to replace the gpu/cpu/storage/camera/mic, assuming one can.........very interested to see how ara plays out
Sorry for the off topic'ish
We want it on 8010 too!
Can this encrypt the external sd card too like Samnsungs vanilla rom?
Can I install this on the N8010?
The description is good, but then I head to the site... Which relies on javascript and several third-party requests (including google and vimeo), and doesn't contain any download links anywhere in sight. Well, thanks.
Having ran NetGuard in logging mode for a few days now I've noticed that many of Samsung's in-built services are contacting web services associated at multiple DNS subdomains under:
- *.360.cn
- *.cloud.360safe.com
A lot of them on unsecured HTTP port 80 (some go via HTTPS port 443).
Services I've observed this behaviour so far are:
- Samsung ApexService
- ANT+ HAL Service
- Application installer (com.sec.android.preloadinstaller)
- Assistant Menu
- AirCommandManager (com.samsung.android.aircommandmanager)
- Plus too many other default services to list (most of which cannot be disabled)
Phone's running on stock unbranded SM-N960F build number PPR1.180610.011.N960FXXU2CSA2.
I've scanned the phone using bundled Device Care's McAfee security scan with no findings.
Has anyone else observed this behaviour?
sengork said:
Having ran NetGuard in logging mode for a few days now I've noticed that many of Samsung's in-built services are contacting web services associated at multiple DNS subdomains under:
- *.360.cn
- *.cloud.360safe.com
A lot of them on unsecured HTTP port 80 (some go via HTTPS port 443).
Services I've observed this behaviour so far are:
- Samsung ApexService
- ANT+ HAL Service
- Application installer (com.sec.android.preloadinstaller)
- Assistant Menu
- AirCommandManager (com.samsung.android.aircommandmanager)
- Plus too many other default services to list (most of which cannot be disabled)
Phone's running on stock unbranded SM-N960F build number PPR1.180610.011.N960FXXU2CSA2.
I've scanned the phone using bundled Device Care's McAfee security scan with no findings.
Has anyone else observed this behaviour?
Click to expand...
Click to collapse
I haven't looked at this as closely as you have,but,I'm guessing it's all tied-in from the Device Maintenance section of the phone.
The name of the company Samsung is currently in bed with is QIHOO:
https://en.wikipedia.org/wiki/Qihoo_360
https://seekingalpha.com/article/4165136-cheetah-mobile-lost-samsung-relevant-risks
Remember/heard of Cheetah Mobile (of Clean Master infamy) ?
https://www.prnewswire.com/news-rel...mobile-security-and-innovation-300043298.html
Well,that's who used to be in partnership w/Samsung & the Device Maintenance aka built-in Clean Master to most,if not all Samsung mobile products.
Fast-Forward to present day & we still have the crapware on our phones,likely scraping info & selling it to anyone interested.
Now,it's just with another company,presumably one with friendlier terms for Samsung.
As you've probably noticed,you can't fully disengage/disable/deny all permissions here,less root (or ADB disabling/package disabler apps).
At least you have a phone that's rootable & can cruise the ROM scene for one that leaves this crap off the phone.
If root isn't an option:
Set up your phone & apps,fine-tune as you like for battery optimization on a per app basis/permissions/etc....
Then,either via ADB or a package disabler,disable the apps responsible for the crapware,especially the ones related to Device Maintenance.
https://forum.xda-developers.com/ga...laxy-note-9-bloatware-removal-thread-t3857508
Follow the link in the OP to the S9/S9+ forum/thread,it gives a better idea of what each .apk actually is/ties into.
Here's the app I use to disable crapware/things I don't use:
https://play.google.com/store/apps/details?id=com.wakasoftware.appfreezer
As to which apps to disable,the S9/S9+ thread,while not an exact match,should give you info on what to disable to stop the phone from pinging the 360 mothership & hopefully,not having any ill effects on the apps you want to keep on-board.
If you want a better idea of how each app is interconnected throughout the phone,use these two apps to take a look:
https://play.google.com/store/apps/details?id=com.ubqsoft.sec01
SD Maid (Pro):
https://play.google.com/store/apps/details?id=eu.thedarken.sdm&hl=en_US
(See the App Control & file manager sections of SD Maid for detailed app info).
Anyhoo,back to curbing the nonsense:
Whichever method you use to disable,should you choose to do so,start with this one:
com.samsung.android.lool (Device Maintenance).
This will make the entire Device Maintenance section inaccessible as well.
That is why I suggest disabling vs outright uninstalling (which necessitates a factory reset to get it back).
You may need to access Device Maintenance for whatever reason from time to time,hence the recommendation for disabling vs uninstalling.
Continue monitoring for a day or so & see if the pinging to the Mothership subsides,or hopefully puts a full-stop to it.
Please keep us updated on what,if any actions you take w/the results. :good:
Excellent overview, it's quite an eye opener thanks for the info.
I've disabled and force-stopped "com.samsung.android.lool" (amongst other junkware) and so far NetGuard hasn't shown a single network log entry to any of the 360 domains. I've uninstalled all 4 Facebook packages. Continuing to monitor this closely. My thought is that I can re-enable "com.samsung.android.lool" from time to time whenever maintenance is needed and then disable it again. Even better Adhell3 might be useful for blocking "com.samsung.android.lool" network attempts whilst retaining it for device management purposes however I haven't tried this yet.
For reference, here is my current list of disabled packages:
Code:
package:com.monotype.android.font.rosemary
package:com.samsung.android.app.ledcoverdream
package:com.sec.android.widgetapp.samsungapps
package:com.samsung.android.app.galaxyfinder
package:com.samsung.svoice.sync
package:com.cnn.mobile.android.phone.edgepanel
package:com.samsung.android.easysetup
package:com.samsung.android.provider.stickerprovider
package:com.samsung.android.app.sbrowseredge
package:com.samsung.android.rubin.app
package:com.sec.android.cover.ledcover
package:com.samsung.faceservice
package:com.monotype.android.font.foundation
package:com.sec.android.widgetapp.easymodecontactswidget
package:com.samsung.android.app.settings.bixby
package:com.sec.android.app.billing
package:com.samsung.android.app.selfmotionpanoramaviewer
package:com.samsung.android.game.gamehome
package:com.samsung.daydream.customization
package:com.sec.enterprise.knox.attestation
package:com.samsung.systemui.bixby2
package:com.dsi.ant.service.socket
package:com.microsoft.skydrive
package:com.samsung.SMT
package:com.samsung.android.drivelink.stub
package:com.android.hotwordenrollment.xgoogle
package:com.samsung.android.sm.devicesecurity
package:com.dsi.ant.sample.acquirechannels
package:com.samsung.android.aircommandmanager
package:com.samsung.android.bixby.service
package:com.samsung.android.smartface
package:com.android.egg
package:com.samsung.android.emojiupdater
package:com.samsung.android.bixby.agent
package:com.android.printspooler
package:com.android.hotwordenrollment.okgoogle
package:com.samsung.android.hmt.vrsvc
package:com.samsung.storyservice
package:com.android.dreams.basic
package:com.android.bips
package:com.samsung.android.game.gametools
package:com.samsung.android.app.simplesharing
package:com.samsung.android.service.peoplestripe
package:com.samsung.android.da.daagent
package:com.dsi.ant.plugins.antplus
package:com.samsung.android.app.taskedge
package:com.google.android.webview
package:com.samsung.android.app.mirrorlink
package:com.dsi.ant.server
package:com.samsung.android.allshare.service.fileshare
package:com.samsung.android.universalswitch
package:com.sec.android.app.apex
package:flipboard.boxer.app
package:com.google.android.printservice.recommendation
package:com.monotype.android.font.chococooky
package:com.android.dreams.phototable
package:com.samsung.android.bixbyvision.framework
package:com.samsung.android.game.gos
package:com.android.wallpaper.livepicker
package:com.samsung.android.beaconmanager
package:com.sec.enterprise.mdm.services.simpin
package:com.samsung.android.stickercenter
package:com.samsung.android.bixby.wakeup
package:com.samsung.android.samsungpass
package:com.samsung.android.spayfw
package:com.linkedin.android
package:com.samsung.android.lool
package:com.samsung.android.knox.analytics.uploader
package:com.samsung.android.sm.policy
package:com.sec.android.emergencylauncher
package:com.samsung.android.visionintelligence
package:com.samsung.android.app.watchmanagerstub
package:com.samsung.android.svoiceime
package:com.samsung.android.mateagent
package:com.enhance.gameservice
package:com.google.vr.vrcore
package:com.hiya.star
package:com.sec.enterprise.knox.cloudmdm.smdms
package:com.samsung.android.app.appsedge
package:com.samsung.android.samsungpassautofill
package:com.monotype.android.font.cooljazz
package:com.samsung.android.allshare.service.mediashare
package:com.samsung.android.app.clipboardedge
package:com.samsung.android.app.motionpanoramaviewer
package:com.samsung.android.bio.face.service
package:com.samsung.android.bixby.agent.dummy
sengork said:
Excellent overview, it's quite an eye opener thanks for the info.
I've disabled and force-stopped "com.samsung.android.lool" (amongst other junkware) and so far NetGuard hasn't shown a single network log entry to any of the 360 domains. I've uninstalled all 4 Facebook packages. Continuing to monitor this closely. My thought is that I can re-enable "com.samsung.android.lool" from time to time whenever maintenance is needed and then disable it again. Even better Adhell3 might be useful for blocking "com.samsung.android.lool" network attempts whilst retaining it for device management purposes however I haven't tried this yet.
For reference, here is my current list of disabled packages:
Code:
package:com.monotype.android.font.rosemary
package:com.samsung.android.app.ledcoverdream
package:com.sec.android.widgetapp.samsungapps
package:com.samsung.android.app.galaxyfinder
package:com.samsung.svoice.sync
package:com.cnn.mobile.android.phone.edgepanel
package:com.samsung.android.easysetup
package:com.samsung.android.provider.stickerprovider
package:com.samsung.android.app.sbrowseredge
package:com.samsung.android.rubin.app
package:com.sec.android.cover.ledcover
package:com.samsung.faceservice
package:com.monotype.android.font.foundation
package:com.sec.android.widgetapp.easymodecontactswidget
package:com.samsung.android.app.settings.bixby
package:com.sec.android.app.billing
package:com.samsung.android.app.selfmotionpanoramaviewer
package:com.samsung.android.game.gamehome
package:com.samsung.daydream.customization
package:com.sec.enterprise.knox.attestation
package:com.samsung.systemui.bixby2
package:com.dsi.ant.service.socket
package:com.microsoft.skydrive
package:com.samsung.SMT
package:com.samsung.android.drivelink.stub
package:com.android.hotwordenrollment.xgoogle
package:com.samsung.android.sm.devicesecurity
package:com.dsi.ant.sample.acquirechannels
package:com.samsung.android.aircommandmanager
package:com.samsung.android.bixby.service
package:com.samsung.android.smartface
package:com.android.egg
package:com.samsung.android.emojiupdater
package:com.samsung.android.bixby.agent
package:com.android.printspooler
package:com.android.hotwordenrollment.okgoogle
package:com.samsung.android.hmt.vrsvc
package:com.samsung.storyservice
package:com.android.dreams.basic
package:com.android.bips
package:com.samsung.android.game.gametools
package:com.samsung.android.app.simplesharing
package:com.samsung.android.service.peoplestripe
package:com.samsung.android.da.daagent
package:com.dsi.ant.plugins.antplus
package:com.samsung.android.app.taskedge
package:com.google.android.webview
package:com.samsung.android.app.mirrorlink
package:com.dsi.ant.server
package:com.samsung.android.allshare.service.fileshare
package:com.samsung.android.universalswitch
package:com.sec.android.app.apex
package:flipboard.boxer.app
package:com.google.android.printservice.recommendation
package:com.monotype.android.font.chococooky
package:com.android.dreams.phototable
package:com.samsung.android.bixbyvision.framework
package:com.samsung.android.game.gos
package:com.android.wallpaper.livepicker
package:com.samsung.android.beaconmanager
package:com.sec.enterprise.mdm.services.simpin
package:com.samsung.android.stickercenter
package:com.samsung.android.bixby.wakeup
package:com.samsung.android.samsungpass
package:com.samsung.android.spayfw
package:com.linkedin.android
package:com.samsung.android.lool
package:com.samsung.android.knox.analytics.uploader
package:com.samsung.android.sm.policy
package:com.sec.android.emergencylauncher
package:com.samsung.android.visionintelligence
package:com.samsung.android.app.watchmanagerstub
package:com.samsung.android.svoiceime
package:com.samsung.android.mateagent
package:com.enhance.gameservice
package:com.google.vr.vrcore
package:com.hiya.star
package:com.sec.enterprise.knox.cloudmdm.smdms
package:com.samsung.android.app.appsedge
package:com.samsung.android.samsungpassautofill
package:com.monotype.android.font.cooljazz
package:com.samsung.android.allshare.service.mediashare
package:com.samsung.android.app.clipboardedge
package:com.samsung.android.app.motionpanoramaviewer
package:com.samsung.android.bio.face.service
package:com.samsung.android.bixby.agent.dummy
Click to expand...
Click to collapse
:good: THX for the update,much appreciated! :good:
I was gonna post this in a bit (just noticed it myself this afternoon,LOL) ,but,it looks like you have added the other two .apks to your disabled list:
https://forum.xda-developers.com/showpost.php?p=78103170&postcount=123
It'a a shame the mfgs aren't required to be more up-front & state ,in common use language where the print is larger than a gnat's ass, the exact nature of the .apks & even more control over the services installed on them.
KOLIOSIS said:
It'a a shame the mfgs aren't required to be more up-front & state ,in common use language where the print is larger than a gnat's ass, the exact nature of the .apks & even more control over the services installed on them.
Click to expand...
Click to collapse
The closest to a manufacturer application list I came across was:
- https://support.samsungknox.com/hc/en-us/articles/115015195728-Common-Criteria-Mode
- For example https://docs.samsungknox.com/CCMode/N960F_O.pdf
This seems to relate to computer security certification known as Common Criteria:
- https://en.wikipedia.org/wiki/Common_Criteria
So the dial home behaviour seems to have passed this security certification (or perhaps the network flows were not part of the certification process). We can only guess...
I've had to reenable the following items to get APK installs to function (either through Play Store or locally stored APKs):
Code:
com.samsung.android.sm.policy
com.samsung.android.sm.devicesecurity
https://forum.xda-developers.com/ga...val-thread-t3857508/post78744845#post78744845
Continuing to monitor with NetGuard. So far ~1hr I haven't seen the packets repeat.
sengork said:
I've had to reenable the following items to get APK installs to function (either through Play Store or locally stored APKs):
https://forum.xda-developers.com/ga...val-thread-t3857508/post78744845#post78744845
Continuing to monitor with NetGuard. So far ~1hr I haven't seen the packets repeat.
Click to expand...
Click to collapse
IIRC,something like this was mentioned in the S9/S9+ debloat thread.
I didn't mention it earlier as you hadn't reported any issues,but,glad you were able to figure it out/find the same info I'd stumbled upon.
Well after a day of usage I can say that battery life is poorer without "com.samsung.android.lool". I've enabled it again now and blocked its domains via Adhell 3:
Code:
360.cn
360safe.com
*.360.cn
*.360safe.com
Furthermore I have disabled its WiFi and Mobile network access in Adhell 3. However this block is bypassed whenever applications using Android's native VPN facility are switched on so its not absolutely fool proof. Similar blocking can be done using NetGuard itself as long as you keep it switched on and filtering continuously.
I'll keep an eye on which other domains it attempts to contact.
sengork said:
Well after a day of usage I can say that battery life is poorer without "com.samsung.android.lool". I've enabled it again now and blocked its domains via Adhell 3:
Code:
360.cn
360safe.com
*.360.cn
*.360safe.com
Furthermore I have disabled its WiFi and Mobile network access in Adhell 3. However this block is bypassed whenever applications using Android's native VPN facility are switched on so its not absolutely fool proof. Similar blocking can be done using NetGuard itself as long as you keep it switched on and filtering continuously.
I'll keep an eye on which other domains it attempts to contact.
Click to expand...
Click to collapse
How much of a difference in battery life are we talking about?
It felt to be about 20%. Is Pie without Device Maintenance expected to put applications to sleep? I am guessing sleep is the major factor here (opposed to cleaning up caches and other storage capacity functions of Device Maintenance app).
sengork said:
It felt to be about 20%. Is Pie without Device Maintenance expected to put applications to sleep? I am guessing sleep is the major factor here (opposed to cleaning up caches and other storage capacity functions of Device Maintenance app).
Click to expand...
Click to collapse
I would like to think so,hoping Device Maintenance isn't ingrained to the level where it breaks the native Doze feature in Android.
JMHO,Device Maintenance seems to be just like Clean Master,running on top of Android/counterproductive,putting a hat on a hat,so to speak,LOL.
I haven't had a Nexus device since the N6 & never had a Pixel,but,I'm pretty sure none of 'em have DM..................................
Whenever I decide to update to Pie,I'm going to continue as I am now:
Battery Optimize all apps that I don't rely on for auto-updating or push notifications & then disabling Device Maintenance.
If something starts acting up,only then do I re-enable DM,take a look at Battery Optimizing for whatever is affected & again,disabling DM.
Guessing you've just recently updated to Pie.......
If it were me,I'd continue to disable DM & give the new OS upgrade a week or so,see what your battery life looks like then.
Battery life loss could be due to some user-installed apps that aren't playing nice w/Pie & not due to DM being disabled.
You will find the logo or text "powered by 360" on storage screen in Samsung device management app.
KOLIOSIS said:
Battery Optimize all apps that I don't rely on for auto-updating or push notifications & then disabling Device Maintenance.
If something starts acting up,only then do I re-enable DM,take a look at Battery Optimizing for whatever is affected & again,disabling DM.
Click to expand...
Click to collapse
I have taken your advise a few weeks ago and have concluded that removing DM whilst manually optimising all individual apps has resulted in no battery loss (in fact it has probably improved but this is within a margin of error). Thanks for your guidance.
Unless you need to connect to a Chinese domain for whatever reason, just block *. cn for good and forever about it.
hello guys i have bought galaxy note 9 in China and there is not preinstalled google play store app...
can anyone tell me how to install safely ))?? thank you ...
hey thanks for your attention but i dont need to access i have vpn i know how to access i want to know how to install because it is not installed so do you have some ideas ?))) how to do it
sandro comaia said:
hey thanks for your attention but i dont need to access i have vpn i know how to access i want to know how to install because it is not installed so do you have some ideas ?))) how to do it
Click to expand...
Click to collapse
Just side-load this .apk & you should be good to go:
https://www.apkmirror.com/apk/googl...5-22-all-0-pr-254908059-android-apk-download/
Was original poster was the only one who had this issue?
Is this a samsung thing or all androids?
Can this be a security risk?
There was a link to the s9 bloatware thread but it doesn't work
https://forum.xda-developers.com/ga...laxy-note-9-bloatware-removal-thread-t3857508
Says 404 not found for me
Nameduser6 said:
Was original poster was the only one who had this issue?
Is this a samsung thing or all androids?
Can this be a security risk?
There was a link to the s9 bloatware thread but it doesn't work
https://forum.xda-developers.com/ga...laxy-note-9-bloatware-removal-thread-t3857508
Says 404 not found for me
Click to expand...
Click to collapse
Should be only Samsung phones. Interestingly i haven't seen it dial home since my original post and up until i uninstalled the Device Care package. Samsung might have changed the domains the tool dials home to.
Sent from my SM-N960F using Tapatalk
Motorola launches new Moto Secure App to give consumers more peace of mind
We know data privacy matters to our consumers. That’s why we have ThinkShield, an ex
motorolanews.com
Hopefully this new app will rollout to all 2022 Moto devices as well.
1. Add an extra layer of protection to sensitive information and apps by hiding select apps and files in Secure Folder, protected by a specific PIN. With Secure Folder, you also have the option to enable Disguised Mode allowing you to select from four icons and name options, rather than visibly displaying apps within a folder, for even more privacy. This is especially helpful for disguising more sensitive information like financial apps, digital wallets, shopping apps, or email accounts behind a discrete icon and label.
2. Whether you’re on the go or working from a public location, minimize risks when connecting to public Wi-Fi and cellular networks with the Network Protection feature. By enabling Network Protection you will automatically be notified when a hotspot or Wi-Fi-related security issue is detected. Within network protection, you can also stop specific apps from using open connections and prevent spoofing by blocking 2G connections.
3. Lock Screen Security allows you to see and control all of your lock screen options to configure the protection you need. This includes the ability to lock network and security functions. For example, previously, a thief could simply turn off your mobile network or Wi-Fi, preventing you from locating your lost device. Now, by enabling this feature, you can stay in control and eliminate the ability for someone to turn off your mobile network or Wi-Fi on your device without unlocking the phone.
4. PIN Pad Scramble shuffles the numerical layout of your entry screen, so you can unlock your device without the risk of prying eyes memorizing the pattern of the numbers you press.
5. The Privacy Dashboard gives you a clear and comprehensive view of which apps have accessed your calendar, contacts, files, camera, microphone and location during the past 24 hours. If you see anything that you’re not comfortable with, you can manage app permissions, update security settings, and change privacy controls right from the Moto Secure App.
ijuanp03 said:
Privacy Dashboard
Click to expand...
Click to collapse
Privacy dashboard is going to be the best feature of the new secure app.
I would like the apk of this app, could anyone provide a link?
Could someone put this APK here for us to test on Android 12?
Haven't seen it around, i'd like from official source.